The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/66011 | vdb entry |
http://securityreason.com/securityalert/8133 | third party advisory |
http://sotiriu.de/adv/NSOADV-2011-003.txt | exploit |
http://secunia.com/advisories/43631 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/516923/100/0/threaded | mailing list |
https://bugzilla.mozilla.org/show_bug.cgi?id=631307 | patch exploit |